Fuck
Behavioral task
behavioral1
Sample
2025-04-03_e5c246640283d6d9a43ed87e58cbd94d_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-03_e5c246640283d6d9a43ed87e58cbd94d_amadey_karagany_rhadamanthys_smoke-loader
-
Size
108KB
-
MD5
e5c246640283d6d9a43ed87e58cbd94d
-
SHA1
f2d4b5c24714a3251e771e0a0f466fa25d4d4c7b
-
SHA256
6a76477cdb68e2c368461752f3ac4f8f6af3ba238252aa9833a6d14ae8045707
-
SHA512
5256e0472a1ff7615343f14e109e4e8ca50111ab0b0faa8ab2b014b9f76f1cc657321e278e0f46a4a32228e8f7aec2dcb28326a2c402423a0b3aa1b5d452020a
-
SSDEEP
1536:nwUHibBDAEGNDL+VepMa+WIy1fAqR9SfPmtvki3bTKkVlnPbEh68XEPV4s5:w0i9D8pM9W91fAXev5jhEh68XEPV4s5
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Signatures
-
Valleyrat_s2 family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-03_e5c246640283d6d9a43ed87e58cbd94d_amadey_karagany_rhadamanthys_smoke-loader
Files
-
2025-04-03_e5c246640283d6d9a43ed87e58cbd94d_amadey_karagany_rhadamanthys_smoke-loader.exe windows:5 windows x86 arch:x86
b8bf08fa843a9ec1ce10d80fbf550c26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
CreateWaitableTimerW
GetThreadContext
InterlockedCompareExchange
OpenProcess
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
ResumeThread
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
GetConsoleWindow
CreateFileW
GetProcAddress
GetLocalTime
IsDebuggerPresent
GetCurrentProcessId
CreateThread
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
MultiByteToWideChar
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
SetThreadContext
VirtualFree
IsValidCodePage
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSAResetEvent
setsockopt
WSACleanup
recv
socket
closesocket
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
gethostbyname
winmm
timeGetTime
Exports
Exports
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ